Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal authentication information extraction and verification method and system based on national cryptographic algorithm

A terminal authentication and national secret algorithm technology, applied in the field of terminal authentication, can solve the problems of terminal forgery, single system protection means and protection targets, data tampering, etc., and achieve the effect of preventing tampering, resisting static analysis and reverse attack

Active Publication Date: 2020-09-25
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Remote server authentication requires that the client must connect to the network server, and in many cases the client cannot meet this condition; local authentication has problems such as data tampering and terminal forgery; in addition, both methods have the problem of single system protection means and protection targets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication information extraction and verification method and system based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] This embodiment provides a method for extracting and verifying terminal authentication information based on a national secret algorithm;

[0027] Such as figure 1 As shown, the terminal authentication information extraction and verification method based on the national secret algorithm includes:

[0028] S1: Obtain a terminal authentication information file; acquire terminal authentication information from the terminal authentication information file;

[0029] S2: sequentially determine whether the serial number in the terminal authentication information is successfully read, determine whether the verification information is successfully read, and determine whether the verification value of the data segment is successfully verified;

[0030] S3: If the above judgment results are all successful, decrypt the data, re-encrypt the data, output the re-encrypted data, and restore the re-encrypted data.

[0031] A method for extracting and verifying terminal authentication i...

Embodiment 2

[0259] This embodiment provides a terminal authentication information extraction and verification system based on the national secret algorithm;

[0260] Terminal authentication information extraction and verification system based on national secret algorithm, including:

[0261] An acquisition module configured to: acquire a terminal authentication information file; acquire terminal authentication information from the terminal authentication information file;

[0262] The judging module is configured to: sequentially judge whether the serial number in the terminal authentication information is successfully read, judge whether the verification information is read successfully, and judge whether the verification value of the data segment is successfully verified;

[0263] The recovery module is configured to: if the above judgment results are all successful, decrypt the data, re-encrypt the data, output the re-encrypted data, and restore the re-encrypted data.

[0264] What ne...

Embodiment 3

[0268] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.

[0269] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal authentication information extraction and verification method and system based on a national cryptographic algorithm. The method comprises the steps of obtaining a terminal authentication information file; acquiring terminal authentication information from the terminal authentication information file; sequentially judging whether the serial number in the terminalauthentication information is successfully read or not, judging whether the verification information is successfully read or not, and judging whether the data segment verification value is successfully verified or not; and if all the judgment results are successful, decrypting the data, re-encrypting the data, outputting the re-encrypted data, and recovering the re-encrypted data.

Description

technical field [0001] The present disclosure relates to the technical field of terminal authentication, in particular to a method and system for extracting and verifying terminal authentication information based on a national secret algorithm. Background technique [0002] The statements in this section merely mention background art related to the present disclosure and do not necessarily constitute prior art. [0003] Terminal authentication is an effective method for copyright protection. At present, remote server authentication and local authentication are mainly used, but both have certain disadvantages. Remote server authentication requires the client to connect to the network server, which is often not met by the client; local authentication has problems such as data tampering and terminal forgery; in addition, both methods have the problem of single system protection means and protection targets . Contents of the invention [0004] In order to solve the deficienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/60
CPCG06F21/44G06F21/602
Inventor 王英龙付勇杨美红陈丽娟
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN